accept no compromises
Showing 1 - 22 of 22 RSS Feed

Files Date: 2013-09-17

Western Digital Arkeia Appliance 10010 Upload / LFI
Posted Sep 17, 2013
Authored by xistence

Western Digital Arkeia Appliance version 10.0.10 suffers from local file inclusion and unauthenticated firmware upload vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, file upload
MD5 | f4f69b8da20f1f808a07c0c30f179c9a
OpenEMR 4.1.1 Patch 14 SQL Injection / Shell Upload
Posted Sep 17, 2013
Authored by xistence

OpenEMR version 4.1.1 Patch 14 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
MD5 | fc85bb950ca8fefa1757abd901f0ab41
Vino VNC Server 3.7.3 Denial Of Service
Posted Sep 17, 2013
Authored by Jonathan Claudius | Site trustwave.com

The Vino VNC server, which is also the default VNC server in Ubuntu (3.4.2-0ubuntu1.2), is vulnerable to a persistent denial of service vulnerability. The vulnerability is triggered when a VNC client, who claims to only support protocol version 3.3, sends malformed data during the authentication selection stage of the authentication process.

tags | exploit, denial of service, protocol
systems | linux, ubuntu
advisories | CVE-2013-5745
MD5 | 9805104b37e287b3c1768723562121fc
Apple Security Advisory 2013-09-17-1
Posted Sep 17, 2013
Authored by Apple | Site apple.com

Apple Security Advisory 2013-09-17-1 - OS X Server v2.2.2 is now available and addresses issues in ClamAV, PostgreSQL, and Wiki Server.

tags | advisory
systems | apple, osx
advisories | CVE-2013-2020, CVE-2013-2021, CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-1034
MD5 | 7a34988774da41ec6514ba0349d1e1fd
Red Hat Security Advisory 2013-1269-01
Posted Sep 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1269-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. A flaw was found in the way Thunderbird handled certain DOM JavaScript objects. An attacker could use this flaw to make JavaScript client or add-on code make incorrect, security sensitive decisions.

tags | advisory, arbitrary, javascript
systems | linux, redhat
advisories | CVE-2013-1718, CVE-2013-1722, CVE-2013-1725, CVE-2013-1730, CVE-2013-1732, CVE-2013-1735, CVE-2013-1736, CVE-2013-1737
MD5 | eb678f2e42c293330434bc964f3f1732
Debian Security Advisory 2758-1
Posted Sep 17, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2758-1 - It was discovered that python-django, a high-level Python web develompent framework, is prone to a denial of service vulnerability via large passwords.

tags | advisory, web, denial of service, python
systems | linux, debian
advisories | CVE-2013-1443
MD5 | 4ea175f90a3ddc719c7e985c8611c322
Red Hat Security Advisory 2013-1268-01
Posted Sep 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1268-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A flaw was found in the way Firefox handled certain DOM JavaScript objects. An attacker could use this flaw to make JavaScript client or add-on code make incorrect, security sensitive decisions.

tags | advisory, web, arbitrary, javascript
systems | linux, redhat
advisories | CVE-2013-1718, CVE-2013-1722, CVE-2013-1725, CVE-2013-1730, CVE-2013-1732, CVE-2013-1735, CVE-2013-1736, CVE-2013-1737
MD5 | edf3c236d712998ac9beac8678a79f4a
Ubuntu Security Notice USN-1951-1
Posted Sep 17, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1951-1 - Multiple memory safety issues were discovered in Firefox. If a user were tricked in to opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute arbitrary code with the privileges of the user invoking Firefox. Atte Kettunen discovered a flaw in the HTML5 Tree Builder when interacting with template elements. In some circumstances, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-1720, CVE-2013-1721, CVE-2013-1722, CVE-2013-1724, CVE-2013-1725, CVE-2013-1728, CVE-2013-1730, CVE-2013-1732, CVE-2013-1737, CVE-2013-1738, CVE-2013-1718, CVE-2013-1719, CVE-2013-1720, CVE-2013-1721, CVE-2013-1722, CVE-2013-1724, CVE-2013-1725, CVE-2013-1728, CVE-2013-1730, CVE-2013-1732, CVE-2013-1735, CVE-2013-1736, CVE-2013-1737, CVE-2013-1738
MD5 | 0e2c46d2ed3bb7e89d0e159910599afc
Mandriva Linux Security Advisory 2013-236
Posted Sep 17, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-236 - svnserve takes a --pid-file option which creates a file containing the process id it is running as. It does not take steps to ensure that the file it has been directed at is not a symlink. If the pid file is in a directory writeable by unprivileged users, the destination could be replaced by a symlink allowing for privilege escalation. svnserve does not create a pid file by default.

tags | advisory
systems | linux, mandriva
advisories | CVE-2013-4277
MD5 | fd79c7de1c9e6a62cc06591fd257813d
WordPress RokNewsPager 1.17 Disclosure / Shell Upload / XSS / DoS
Posted Sep 17, 2013
Authored by MustLive

WordPress RokNewsPager plugin version 1.17 suffers from cross site scripting, denial of service, path disclosure, abuse of functionality, and remote shell upload vulnerabilities.

tags | exploit, remote, denial of service, shell, vulnerability, xss, info disclosure
MD5 | bc995bf63220c22544382f4a65cb49c9
WordPress RokStories 1.25 Disclosure / Shell Upload / XSS / DoS
Posted Sep 17, 2013
Authored by MustLive

WordPress RokStories plugin version 1.25 suffers from cross site scripting, denial of service, path disclosure, abuse of functionality, and remote shell upload vulnerabilities.

tags | exploit, remote, denial of service, shell, vulnerability, xss, info disclosure
MD5 | 4a62485894b1c6c2798b571b9e4cf47c
Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify()
Posted Sep 17, 2013
Site packetstormsecurity.com

The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

tags | advisory, java, remote, code execution, bug bounty, packet storm
systems | windows
MD5 | d214e42d098835e3c009f46b370f9bfb
Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption
Posted Sep 17, 2013
Site packetstormsecurity.com

The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

tags | exploit, java, remote, code execution, bug bounty, packet storm
systems | windows
MD5 | 0598551c2fbd314708de83c41bc77fd6
Sophos Web Protection Appliance clear_keys.pl Local Privilege Escalation
Posted Sep 17, 2013
Authored by Francisco Falcon, juan vazquez | Site metasploit.com

This Metasploit module abuses a command injection on the clear_keys.pl perl script, installed with the Sophos Web Protection Appliance, to escalate privileges from the "spiderman" user to "root". This Metasploit module is useful for post exploitation of vulnerabilities on the Sophos Web Protection Appliance web ui, executed by the "spiderman" user. This Metasploit module has been tested successfully on Sophos Virtual Web Appliance 3.7.0.

tags | exploit, web, root, perl, vulnerability
advisories | CVE-2013-4984, OSVDB-97028
MD5 | 045d7706a83f11ef97ef77f137a6d58b
Red Hat Security Advisory 2013-1265-01
Posted Sep 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1265-01 - JBoss Web is a web container based on Apache Tomcat. It provides a single deployment platform for the JavaServer Pages and Java Servlet technologies. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.

tags | advisory, java, remote, web, arbitrary
systems | linux, redhat
advisories | CVE-2013-2185
MD5 | f47e373a09cfdb0efcb24ad0f0201c0d
D-Link Devices UPnP SOAP Telnetd Command Execution
Posted Sep 17, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Various D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. This Metasploit module has been tested successfully on DIR-300, DIR-600, DIR-645, DIR-845 and DIR-865. According to the vulnerability discoverer, more D-Link devices may be affected.

tags | exploit
advisories | OSVDB-94924
MD5 | 00c34b395cc7d8d94497435c43c491f6
Sophos Web Protection Appliance sblistpack Arbitrary Command Execution
Posted Sep 17, 2013
Authored by Francisco Falcon, juan vazquez | Site metasploit.com

This Metasploit module exploits a command injection vulnerability on Sophos Web Protection Appliance 3.7.9, 3.8.0 and 3.8.1. The vulnerability exists on the sblistpack component, reachable from the web interface without authentication. This Metasploit module has been tested successfully on Sophos Virtual Web Appliance 3.7.0.

tags | exploit, web
advisories | CVE-2013-4983, OSVDB-97029
MD5 | efad4b08bc7895d76145207b6fc9645d
Gentoo Linux Security Advisory 201309-10
Posted Sep 17, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201309-10 - A vulnerability in Adobe Reader could result in execution of arbitrary code execution or denial of service. Versions less than 9.5.5 are affected.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2013-3346
MD5 | ea958cc1229e5eeeb5f54f039c0983c7
Agnitum Outpost Internet Security Local Privilege Escalation
Posted Sep 17, 2013
Authored by juan vazquez, Ahmad Moghimi | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability on Agnitum Outpost Internet Security 8.1. The vulnerability exists in the acs.exe component, allowing the user to load load arbitrary DLLs through the acsipc_server named pipe, and finally execute arbitrary code with SYSTEM privileges. This Metasploit module has been tested successfully on Windows 7 SP1 with Agnitum Outpost Internet Security 8.1 (32 bits and 64 bits versions).

tags | exploit, arbitrary
systems | windows, 7
advisories | OSVDB-96208
MD5 | 642ed3c829eb953785cbb76c7ac6af56
HP ProCurve Manager SNAC UpdateDomainControllerServlet File Upload
Posted Sep 17, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a path traversal flaw in the HP ProCurve Manager SNAC Server. The vulnerability in the UpdateDomainControllerServlet allows an attacker to upload arbitrary files, just having into account binary writes aren't allowed. Additionally, authentication can be bypassed in order to upload the file. This Metasploit module has been tested successfully on the SNAC server installed with HP ProCurve Manager 4.0.

tags | exploit, arbitrary
advisories | CVE-2013-4811, OSVDB-97154
MD5 | b584e9123b4299224757d83b6266d5e8
HP ProCurve Manager SNAC UpdateCertificatesServlet File Upload
Posted Sep 17, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a path traversal flaw in the HP ProCurve Manager SNAC Server. The vulnerability in the UpdateCertificatesServlet allows an attacker to upload arbitrary files, just having into account binary writes aren't allowed. Additionally, authentication can be bypassed in order to upload the file. This Metasploit module has been tested successfully on the SNAC server installed with HP ProCurve Manager 4.0.

tags | exploit, arbitrary
advisories | CVE-2013-4812, OSVDB-97155
MD5 | 655ea7e5a3301cf06fe81698db51eafa
CVE Checker 3.3
Posted Sep 17, 2013
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Mainly a bugfix release, but contains a few features such as allowing standard input for the binary list as well as introduction of the CVECHECKER_CONFFILE environment variable.
tags | tool, vulnerability
systems | unix
MD5 | b344d7bfdaf2c244778012c5a7ccdfce
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close